Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching refs:wps

2  * wpa_supplicant / WPS integration
48 wpa_printf(MSG_DEBUG, "WPS: PIN registration with " MACSTR
66 wpa_printf(MSG_DEBUG, "WPS: Network configuration replaced - "
76 wpa_printf(MSG_DEBUG, "WPS: Registration completed - waiting "
100 * Many existing WPS APs do not know how to negotiate WPA2 or CCMP in
125 wpa_printf(MSG_DEBUG, "WPS: AP found from scan results");
130 wpa_printf(MSG_DEBUG, "WPS: The AP was not found from scan "
155 wpa_printf(MSG_DEBUG, "WPS: The AP did not yet advertise WPA "
163 wpa_printf(MSG_DEBUG, "WPS: Add CCMP into the credential "
174 wpa_printf(MSG_DEBUG, "WPS: Add WPA2 into the credential "
207 wpa_hexdump_key(MSG_DEBUG, "WPS: Received Credential attribute",
213 wpa_hexdump_ascii(MSG_DEBUG, "WPS: SSID", cred->ssid, cred->ssid_len);
214 wpa_printf(MSG_DEBUG, "WPS: Authentication Type 0x%x",
216 wpa_printf(MSG_DEBUG, "WPS: Encryption Type 0x%x", cred->encr_type);
217 wpa_printf(MSG_DEBUG, "WPS: Network Key Index %d", cred->key_idx);
218 wpa_hexdump_key(MSG_DEBUG, "WPS: Network Key",
220 wpa_printf(MSG_DEBUG, "WPS: MAC Address " MACSTR,
225 wpa_printf(MSG_DEBUG, "WPS: Workaround - convert mixed-mode "
234 wpa_printf(MSG_DEBUG, "WPS: Ignored credentials for "
241 wpa_printf(MSG_DEBUG, "WPS: Replace WPS network block based "
251 wpa_printf(MSG_DEBUG, "WPS: Create a new network based on the "
275 wpa_printf(MSG_ERROR, "WPS: Invalid WEP Key length "
280 wpa_printf(MSG_ERROR, "WPS: Invalid WEP Key index %d",
290 wpa_printf(MSG_ERROR, "WPS: Invalid WEP Key "
347 wpa_printf(MSG_ERROR, "WPS: Invalid Network "
361 wpa_printf(MSG_ERROR, "WPS: Invalid Network Key "
373 wpa_printf(MSG_DEBUG, "WPS: Failed to update configuration");
447 /* Remove any existing WPS network from configuration */
481 if (wpa_config_set(ssid, "key_mgmt", "WPS", 0) < 0 ||
519 wpa_hexdump_ascii(MSG_DEBUG, "WPS: Picked SSID from "
526 wpa_printf(MSG_DEBUG, "WPS: More than one SSID found "
622 wpa_printf(MSG_DEBUG, "WPS: Received new WPA/WPA2-PSK from WPS for "
639 wpa_printf(MSG_DEBUG, "WPS: PIN needed for UUID-E %s", uuid);
640 len = os_snprintf(txt, sizeof(txt), "WPS-EVENT-PIN-NEEDED %s " MACSTR
653 struct wps_context *wps;
656 wps = os_zalloc(sizeof(*wps));
657 if (wps == NULL)
660 wps->cred_cb = wpa_supplicant_wps_cred;
661 wps->event_cb = wpa_supplicant_wps_event;
662 wps->cb_ctx = wpa_s;
664 wps->dev.device_name = wpa_s->conf->device_name;
665 wps->dev.manufacturer = wpa_s->conf->manufacturer;
666 wps->dev.model_name = wpa_s->conf->model_name;
667 wps->dev.model_number = wpa_s->conf->model_number;
668 wps->dev.serial_number = wpa_s->conf->serial_number;
673 wps->dev.categ = atoi(wpa_s->conf->device_type);
676 wpa_printf(MSG_ERROR, "WPS: Invalid device_type");
677 os_free(wps);
682 wpa_printf(MSG_ERROR, "WPS: Invalid device_type OUI");
683 os_free(wps);
686 wps->dev.oui = WPA_GET_BE32(oui);
689 wpa_printf(MSG_ERROR, "WPS: Invalid device_type");
690 os_free(wps);
694 wps->dev.sub_categ = atoi(pos);
696 wps->dev.os_version = WPA_GET_BE32(wpa_s->conf->os_version);
697 wps->dev.rf_bands = WPS_RF_24GHZ | WPS_RF_50GHZ; /* TODO: config */
698 os_memcpy(wps->dev.mac_addr, wpa_s->own_addr, ETH_ALEN);
700 uuid_gen_mac_addr(wpa_s->own_addr, wps->uuid);
701 wpa_hexdump(MSG_DEBUG, "WPS: UUID based on MAC address",
702 wps->uuid, WPS_UUID_LEN);
704 os_memcpy(wps->uuid, wpa_s->conf->uuid, WPS_UUID_LEN);
706 wps->auth_types = WPS_AUTH_WPA2PSK | WPS_AUTH_WPAPSK;
707 wps->encr_types = WPS_ENCR_AES | WPS_ENCR_TKIP;
714 wps->registrar = wps_registrar_init(wps, &rcfg);
715 if (wps->registrar == NULL) {
716 wpa_printf(MSG_DEBUG, "Failed to initialize WPS Registrar");
717 os_free(wps);
721 wpa_s->wps = wps;
731 if (wpa_s->wps == NULL)
734 wps_registrar_deinit(wpa_s->wps->registrar);
735 os_free(wpa_s->wps->network_key);
736 os_free(wpa_s->wps);
737 wpa_s->wps = NULL;
752 wpa_printf(MSG_DEBUG, " skip - non-WPS AP");
757 wpa_printf(MSG_DEBUG, " skip - WPS AP "
764 wpa_printf(MSG_DEBUG, " selected based on WPS IE "
772 wpa_printf(MSG_DEBUG, " skip - non-WPS AP");
777 * Start with WPS APs that advertise active PIN Registrar and
778 * allow any WPS AP after third scan since some APs do not set
784 wpa_printf(MSG_DEBUG, " skip - WPS AP "
789 wpa_printf(MSG_DEBUG, " selected based on WPS IE");
791 wpa_printf(MSG_DEBUG, " selected based on WPS IE "
799 wpa_printf(MSG_DEBUG, " selected based on WPS IE");
818 /* allow wildcard SSID for WPS PBC */
826 /* allow wildcard SSID for WPS PIN */